{"affected":[{"ecosystem_specific":{"binaries":[{"podman":"4.9.5-150400.4.35.1","podman-remote":"4.9.5-150400.4.35.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Micro 5.3","name":"podman","purl":"pkg:rpm/suse/podman&distro=SUSE%20Linux%20Enterprise%20Micro%205.3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.9.5-150400.4.35.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"podman":"4.9.5-150400.4.35.1","podman-remote":"4.9.5-150400.4.35.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Micro 5.4","name":"podman","purl":"pkg:rpm/suse/podman&distro=SUSE%20Linux%20Enterprise%20Micro%205.4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.9.5-150400.4.35.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"podman":"4.9.5-150400.4.35.1","podman-docker":"4.9.5-150400.4.35.1","podman-remote":"4.9.5-150400.4.35.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise High Performance Computing 15 SP4-ESPOS","name":"podman","purl":"pkg:rpm/suse/podman&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP4-ESPOS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.9.5-150400.4.35.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"podman":"4.9.5-150400.4.35.1","podman-docker":"4.9.5-150400.4.35.1","podman-remote":"4.9.5-150400.4.35.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise High Performance Computing 15 SP4-LTSS","name":"podman","purl":"pkg:rpm/suse/podman&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP4-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.9.5-150400.4.35.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"podman":"4.9.5-150400.4.35.1","podman-docker":"4.9.5-150400.4.35.1","podman-remote":"4.9.5-150400.4.35.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 15 SP4-LTSS","name":"podman","purl":"pkg:rpm/suse/podman&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP4-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.9.5-150400.4.35.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"podman":"4.9.5-150400.4.35.1","podman-docker":"4.9.5-150400.4.35.1","podman-remote":"4.9.5-150400.4.35.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 15 SP4","name":"podman","purl":"pkg:rpm/suse/podman&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.9.5-150400.4.35.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"\nThis update for podman fixes the following issues:\n\n- CVE-2024-9676: github.com/containers/storage: Fixed symlink traversal vulnerability in the containers/storage library can cause Denial of Service (DoS) (bsc#1231698) \n\n- Load ip_tables and ip6_tables kernel module (bsc#1214612)\n  * Required for rootless mode as a regular user has no permission\n    to load kernel modules\n\n- CVE-2024-9675: Fixed cache arbitrary directory mount in buildah (bsc#1231499)\n- CVE-2024-9407: Fixed Improper Input Validation in bind-propagation Option of Dockerfile RUN --mount Instruction in buildah (bsc#1231208)\n- CVE-2024-9341: cri-o: FIPS Crypto-Policy Directory Mounting Issue in containers/common Go Library (bsc#1231230)\n- CVE-2024-1753: Fixed full container escape at build time in buildah (bsc#1221677)\n- CVE-2024-11218: Fixed a container breakout by using --jobs=2 and a race condition when building a malicious Containerfile. (bsc#1236270)\n\n- Refactor network backend dependencies:\n  * podman requires either netavark or cni-plugins. On ALP, require\n    netavark, otherwise prefer netavark but don't force it.\n  * This fixes missing cni-plugins in some scenarios\n  * Default to netavark everywhere where it's available\n","id":"SUSE-SU-2025:0267-1","modified":"2025-01-28T11:25:30Z","published":"2025-01-28T11:25:30Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2025/suse-su-20250267-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1214612"},{"type":"REPORT","url":"https://bugzilla.suse.com/1215807"},{"type":"REPORT","url":"https://bugzilla.suse.com/1215926"},{"type":"REPORT","url":"https://bugzilla.suse.com/1217828"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221677"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231208"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231230"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231499"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231698"},{"type":"REPORT","url":"https://bugzilla.suse.com/1236270"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-11218"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-1753"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-9341"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-9407"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-9675"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-9676"}],"related":["CVE-2024-11218","CVE-2024-1753","CVE-2024-9341","CVE-2024-9407","CVE-2024-9675","CVE-2024-9676"],"summary":"Security update for podman","upstream":["CVE-2024-11218","CVE-2024-1753","CVE-2024-9341","CVE-2024-9407","CVE-2024-9675","CVE-2024-9676"]}